IT Systems  >   Business Systems  >  

Security Systems

RSS Feed    Add to Google    Add to My Yahoo!
Security Systems Reports
201 - 225 of 1178 Matches Previous Page  |  Next Page
7 Features You'll Find in the Most Advanced DLP Systems
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Learn seven key features to look for when evaluating a DLP system, and how each one overlaps with the others to provide your enterprise with optimal protection.
Posted: 01 May 2017 | Published: 01 May 2017

Symantec & Blue Coat Systems

ESG Labs Weigh-in on Advanced Threat Protection
sponsored by Proofpoint, Inc.
WHITE PAPER: In this ESG lab report discover how to deploy fast and easy identification and prioritization of email-based cybersecurity threats, giving your organization at-a-glance summary information about each threat.
Posted: 01 May 2017 | Published: 31 Jan 2017

Proofpoint, Inc.

Case Study: How the Diamond Model of Intrusion Analysis Unveiled Key Details About Malicious Activity
sponsored by ThreatConnect
WHITE PAPER: In the following case study, discover ways to gain a holistic view of threat intelligence and incident response so you can unite your entire security operations around a common defense, make informed business decisions, and more.
Posted: 01 May 2017 | Published: 01 May 2017

ThreatConnect

Office 365: This the ROI You Were Expecting?
sponsored by Microsoft
WHITE PAPER: In this Forrester study learn the total economic impact of Microsoft Office 365 for small and midsize businesses, and give you a sense of what kind of ROI to expect when deploying Office 365.
Posted: 28 Apr 2017 | Published: 28 Apr 2017

Microsoft

Office 365: Is the ROI worth it?
sponsored by Microsoft
WHITE PAPER: In this Forrester report discover the ROI of Office 365, and better understand the benefits, costs, and risks associated with an Office 365 implementation within a mid-sized company.
Posted: 28 Apr 2017 | Published: 28 Apr 2017

Microsoft

Create Your Cloud Security Technology Strategy And Road Map
sponsored by Microsoft
WHITE PAPER: Forrester Research warns that "your current 'we control everything' security strategy does not apply to the cloud". With such a fundamental shift, how can CISOs approach the issue? Access this Forrester report to discover how to secure your enterprise on the cloud.
Posted: 28 Apr 2017 | Published: 28 Apr 2017

Microsoft

How to Gain Unified Endpoint Management in Your Mobile Computing Network
sponsored by IBM
WHITE PAPER: Given the importance of mobile computing in keeping businesses competitive, it's more important than ever that organizations strike the appropriate balance between security and productivity. Access this whitepaper to uncover how to act upon security best practices, score your business' security infrastructure and more.
Posted: 28 Apr 2017 | Published: 31 Mar 2017

IBM

How Credential Phishing is Changing — How to Stop It
sponsored by Proofpoint, Inc.
WHITE PAPER: Learn how to stop phishing attacks and how the strategy and tactics are getting more sophisticated in surprising ways.
Posted: 28 Apr 2017 | Published: 28 Apr 2017

Proofpoint, Inc.

Managing Business Email Compromise and Imposter Threats
sponsored by Proofpoint, Inc.
WHITE PAPER: Learn how to deploy a three-pronged approach in defending your enterprise from email fraud, scams, and phishing.
Posted: 28 Apr 2017 | Published: 28 Apr 2017

Proofpoint, Inc.

Learn How You can Provide UEM Across Desktops, Laptops, Tablets, Smartphones, and IoT
sponsored by IBM
DATA SHEET: Managing the security of all your organization's devices is a tall order, but it isn't impossible. In this data sheet, learn about a system that takes a smarter approach to unified endpoint management to help you consolidate your security.
Posted: 27 Apr 2017 | Published: 31 Mar 2017

IBM

The Six Essential Capabilities of an Analytics-Driven SIEM
sponsored by Splunk
WHITE PAPER: Uncover the 6 essential capabilities of an analytics-driven SIEM. Discover how having these capabilities will allow your enterprise to monitor threats in real time and respond quickly to incidents, minimize risks from insider threats or accidental compromise, and more.
Posted: 26 Apr 2017 | Published: 26 Apr 2017

Splunk

Getting Started With Dmarc: Your Email Security
sponsored by Proofpoint, Inc.
WHITE PAPER: Discover how to protect employees, business partners, and consumers from fraudulent email, give immediate insight into the email threat landscape, increase email deliverability and engagement, reduce customer service cost,reduce phishing remediation costs, and more.
Posted: 26 Apr 2017 | Published: 26 Apr 2017

Proofpoint, Inc.

ITAD to Strengthen Data Protection
sponsored by Iron Mountain
WHITE PAPER: IT Asset Disposition is quickly becoming a one stop shop for mitigating end-of-lifecycle risks and data protection compliance. Learn the importance of ITAD in protecting data and meeting compliance requirements.
Posted: 25 Apr 2017 | Published: 25 Apr 2017

Iron Mountain

DevSecOps: How to Seamlessly Integrate Security Into DevOps
sponsored by Sonatype
WHITE PAPER: In this Gartner report discover strong recommendations for IT security professionals to preserve the teamwork, agility and speed of DevOps and agile development environments, all while ensuring security.
Posted: 25 Apr 2017 | Published: 30 Sep 2016

Sonatype

Perimeter Security: An Identity Crisis
sponsored by F5 Networks
WHITE PAPER: Discover how to rethink, re-invent, and re-architect your IAM strategies. Access this white paper to learn how to ensure secure authentication for all apps and address the inherent risks associated with decentralized access controls and identity sprawl.
Posted: 25 Apr 2017 | Published: 25 Apr 2017

F5 Networks

Transitioning from Managed Services to Managed Security
sponsored by AlienVault
WHITE PAPER: Transitioning from MSP to MSSP is a well-trodden path and success is due to people, processes, and tech in equal proportions. In this white paper, learn about the current state of the MSSP market and best practices for new MSSPs.
Posted: 25 Apr 2017 | Published: 19 Dec 2016

AlienVault

The Next Security Frontier: Automation, Things and Intelligent Machines
sponsored by SearchSecurity.com
VIRTUAL SEMINAR: Stay on top of the current cybersecurity landscape and join us for this live virtual conference on June 27th.
Posted: 24 Apr 2017 | Premiered: 24 Apr 2017

SearchSecurity.com

Demystifying The Threat Landscape: 10 Ways Network Security Pros Can Step Up Game
sponsored by F5 Networks
WHITE PAPER: In this eBook, you'll learn more about the changing network security landscape, where your business is most vulnerable today, and 10 areas you can step up your security game.
Posted: 24 Apr 2017 | Published: 30 Dec 2016

F5 Networks

Report: Tracking Global Internet Encryption Trends
sponsored by F5 Networks
WHITE PAPER: Discover the numbers, drivers, and trends behind the jump from virtually non-existent encryption of browsers, social media sites, webmail, and SaaS applications to today's reality of over 50% encryption.
Posted: 24 Apr 2017 | Published: 24 Apr 2017

F5 Networks

Achieving Optimal IFRS 9 Compliance
sponsored by SAS
WHITE PAPER: Learn how to comply with IFRS 9 by using technology to optimally approach the implementation challenges it creates. Discover what's driving the IFRS 9 accounting standard, technology and partners for optimal IFRS 9compliance, and more.
Posted: 24 Apr 2017 | Published: 24 Apr 2017

SAS

Security Report: Transaction Monitoring Optimization
sponsored by SAS
WHITE PAPER: Financial fraudsters are targeting both institutions and consumers of digital services as more and more customers are demanding diverse digital channels. Discover how fraudsters are exploiting these capabilities and learn to fight fraud with customer experience in mind.
Posted: 21 Apr 2017 | Published: 31 Dec 2016

SAS

SAS Solution for Personal Data ProtectionEnabling compliance with new regulation
sponsored by SAS
WHITE PAPER: Failing to comply with the GDPR can result in a fine of 20 million EUR or 4% of your organization's annual global turnover: it's simply a risk you can't ignore. Discover: 10 compliance challenges, 3 de-identification techniques that create problems, and 5 areas for improvement to help meet evolving demands.
Posted: 21 Apr 2017 | Published: 21 Apr 2017

SAS

Secure and Govern Workloads and Infrastructure with Policy
sponsored by Apcera
WEBCAST: Learn how to make policy management effective by building it around the workload, the 4 key areas where organizations need security policy, how to use automation to enforce policy, and more.
Posted: 21 Apr 2017 | Premiered: May 26, 2016


The Role of Policy in Governing and Securing the Cloud
sponsored by Apcera
WHITE PAPER: Learn how to enable your security policy to help mitigate human errors and avoid costly data breaches. Additionally uncover 4 key areas where you need a security policy, a 3-part methodology to modern policy, and more.
Posted: 21 Apr 2017 | Published: 29 Feb 2016


Cyber Threats: A perfect storm about to hit Europe?
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: As the internet of things becomes increasingly popular, some European countries lack the capabilities to defend against cyber security threats. Meanwhile, in the private sector, hackers are stepping up attacks on manufacturing and telecommunications companies, this report from Marsh & McLennan reveals.
Posted: 21 Apr 2017 | Published: 21 Apr 2017

ComputerWeekly.com
201 - 225 of 1178 Matches Previous Page    7 8 9 10 11 12    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement